DOI QR코드

DOI QR Code

On the development of DES round key generator based on Excel Macro

엑셀 매크로기능을 이용한 DES의 라운드 키 생성개발

  • Kim, Daehak (Department of Mathematics, Catholic University of Daegu)
  • Received : 2012.10.30
  • Accepted : 2012.11.25
  • Published : 2012.11.30

Abstract

In this paper, we consider the development of round key generator of DES (data encryption standard) based on Microsoft Excel Macro, which was adopted as the FIPS (federal information processing standard) of USA in 1977. Simple introduction to DES is given. Algorithms for round key generator are adapted to excel macro. By repeating the 16 round which is consisted of diffusion (which hide the relation between plain text and cipher text) and the confusion (which hide the relation between cipher key and cipher text) with Microsoft Excel Macro, we can easily get the desired DES round keys.

본 논문에서는 1977년 미국 국립기술표준원이 연방정보처리기준 46으로 공표한 암호화 표준인 현대 대칭키 블록 암호 DES (data encryption standard)의 라운드 키 생성기에 대한 엑셀 매크로 기능을 활용한 라운드 키 생성을 개발하였다. 평문과 암호문과의 관계를 숨기는 확산과 암호문과 암호 키 사이의 관계를 숨기는 혼돈을 반복하는 라운드의 반복으로 평문을 암호화 하는 DES의 설명과 라운드 키 생성 알고리즘을 소개하고 이를 엑셀 매크로기능을 이용하여 라운드 키를 구현하는 생성개발을 제안하고 개발된 매크로의 정확성과 활용성을 서술하였다.

Keywords

References

  1. Choi, H. S. and Ha, J. (2011a). Development of process-oriented education tool for Statistics with Excel Macro. Journal of the Korean Data & Information Science Society, 22, 643-650.
  2. Choi, H. S. and Ha, J. (2011b). Development of Bayes' rule education tool with Excel Macro. Journal of the Korean Data & Information Science Society, 23, 905-912. https://doi.org/10.7465/jkdi.2012.23.5.905
  3. Choi, H. S. and Kim, T. Y. (2010). A study on sampling using the function of excel. Journal of the Korean Data & Information Science Society, 21, 481-491.
  4. Forouzan, B. A. (2008). Introduction to cryptography and network security, The McGraw-Hill Companies, New York.
  5. Hoffstein, J., Pipher, J. and Silverman, J. H. (2008). An introduction to mathematical cryptography, Springer, New York.
  6. Kahn, D. (1996). The codebreakers : The story of secret writing, Scribner's, New York.
  7. Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method of obtaining digital signature and public-key cryptosystem. Communication of the Association for Computing Machinery, 21, 120-126. https://doi.org/10.1145/359340.359342
  8. Shannon, C. E. (1949). Communication theory of secrecy system. The Bell Laps Technical Journal, 28, 656-715.
  9. Trappe, W. and Washington, L. (2006). Introduction to cryptography and coding theory, Prentice Hall, Upper Saddle River.

Cited by

  1. Computer intensive method for extended Euclidean algorithm vol.25, pp.6, 2014, https://doi.org/10.7465/jkdi.2014.25.6.1467
  2. An educational tool for regression models with dummy variables using Excel VBA vol.24, pp.3, 2013, https://doi.org/10.7465/jkdi.2013.24.3.593
  3. An educational tool for binary logistic regression model using Excel VBA vol.25, pp.2, 2014, https://doi.org/10.7465/jkdi.2014.25.2.403
  4. On the development of DES encryption based on Excel Macro vol.25, pp.6, 2014, https://doi.org/10.7465/jkdi.2014.25.6.1419
  5. 공인인증서의 암호학 활용에 관한 연구 vol.28, pp.1, 2012, https://doi.org/10.7465/jkdi.2017.28.1.163